NDSS 2025 – CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP
研究人员提出了一种名为CounterSEVeillance的侧信道攻击方法,利用AMD SEV-SNP虚拟机的性能计数器数据泄露敏感信息。该攻击可在完全修补的系统上运行,并通过分析228个暴露的性能计数器事件,精确恢复秘密依赖的条件分支结果和操作数属性。研究人员展示了四个案例研究,包括提取RSA-4096密钥、破解TOTP验证码等。 2025-12-27 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

Session 7B: Trusted Hardware and Execution

Authors, Creators & Presenters: Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany and
Fraunhofer Austria, Vienna, Austria), Daniel Gruss (Graz University of Technology) |
PAPER
CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP
Confidential virtual machines (VMs) promise higher security by running the VM inside a trusted execution environment (TEE). Recent AMD server processors support confidential VMs with the SEV-SNP processor extension. SEV-SNP provides guarantees for integrity and confidentiality for confidential VMs despite running them in a shared hosting environment. In this paper, we introduce CounterSEVeillance, a new side-channel attack leaking secret-dependent control flow and operand properties from performance counter data. Our attack is the first to exploit performance counter side-channel leakage with single-instruction resolution from SEV-SNP VMs and works on fully patched systems. We systematically analyze performance counter events in SEV-SNP VMs and find that 228 are exposed to a potentially malicious hypervisor. CounterSEVeillance builds on this analysis and records performance counter traces with an instruction-level resolution by single-stepping the victim VM using APIC interrupts in combination with page faults. We match CounterSEVeillance traces against binaries, precisely recovering the outcome of any secret-dependent conditional branch and inferring operand properties. We present four attack case studies, in which we exemplarily showcase concrete exploitable leakage with 6 of the exposed performance counters. First, we use CounterSEVeillance to extract a full RSA-4096 key from a single Mbed TLS signature process in less than 8 minutes. Second, we present the first side-channel attack on TOTP verification running in an AMD SEV-SNP VM, recovering a 6-digit TOTP with only 31.1 guesses on average. Third, we show that CounterSEVeillance can leak the secret key from which the TOTPs are derived from the underlying base32 decoder. Fourth and finally, we show that CounterSEVeillance can also be used to construct a plaintext-checking oracle in a divide-and-surrender-style attack. We conclude that moving an entire VM into a setting with a privileged adversary increases the attack surface, given the vast amounts of code not vetted for this specific security setting.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/TYBhhkOaEQ4?si=BjQE_KGgTtFEKv81


文章来源: https://securityboulevard.com/2025/12/ndss-2025-counterseveillance-performance-counter-attacks-on-amd-sev-snp/
如有侵权请联系:admin#unsafe.sh